CIS exam 2 quiz q's

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which federal law protects children against online stalking by making it a federal crime to communicate with any person with the intent to solicit or entice a child into unlawful sexual activity?

18 USC 2425

For a sex offender who is at Tier 2 of the Adam Walsh Act, how long do they need to remain registered.

25 years

The number of Internet users worldwide is quickly approaching which of the following?

4 billion

Approximately how much material is being uploaded to YouTube every minute making it difficult to review all material submitted for posting?

400 hours

How many H-1B visas has Congress set as the maximum amount to be granted yearly?

65,000

Companies applying for H-1B visas must offer a wage that is at least what percent of the average salary for the occupation?

95%

Which of the following are defined as a set of interrelated components that include hardware, software, databases, networks, people, and procedures that collect data, process it, and disseminate the output?

Business information systems

After an organization decides to adopt which of the following, it must conduct an assessment of its software development practices to determine where they fit in the capability model?

CMMI-DEV

Which of the following requires manufacturers to use at least 65 percent reusable or recyclable components and reduce or eliminate toxic material in their packaging?

European Union's Restriction of Hazardous Substances Directive

Which of the following is currently the most popular social network destination worldwide?

Facebook

An important technique used to develop ISO 9001-compliant quality systems by both evaluating reliability and determining the effects of system and equipment failures is which of the following?

Failure mode and effects analysis (FMEA)

Organizations can use which of the following to capture interviews with customers, managers, and industry leaders?

Google Hangouts On Air

Which of the following is true of the International Organization for Standardization?

It is a worldwide federation of national standards bodies from 161 countries.

Which company has been able to achieve EPEAT's Gold level by using increasing amounts of recycled plastics in their product development?

Lenovo

Which of the following requires the presence of patients and healthcare providers at different sites at the same time and often involves a videoconference link between the two sites?

Live telemedicine

Which of the following helps physicians keep tabs on patients prone to life-threatening health crises?

Remote monitoring

Which of the following involves acquiring data, sound, images, and video from a patient and then transmitting everything to a medical specialist for later evaluation?

Store-and-forward telemedicine

Which of the following requires member governments to ensure that intellectual property rights can be enforced under their laws and that penalties for infringement are tough enough to deter further violations?

TRIPS agreement

Which of the following technologies employs electronic information processing and telecommunications to support at-a-distance health care, provide professional and patient health-related training, and support healthcare administration?

Telehealth

Which of the following imposes penalties of up to $10 million and 15 years in prison for the theft of trade secrets?

The Economic Espionage Act (EEA) of 1996

A patent is a grant of a property right issued by which entity?

USPTO

A social networking platform:

can be used for business purposes

One of the fundamental ways in which companies can try directly to increase productivity is by:

consolidating operations to better leverage economies of scale

Abusive behavior, which involves the use of an electronic communications device, that is degrading, humiliating, hurtful, insulting, intimidating, malicious, or otherwise offensive to an individual or group of individuals causing substantial emotional distress is known as which of the following?

cyberharassment

Which of the following can read the machine language of a software program and produce the source code?

decompiler

Which of the following can be oral, written, or inferred from the seller's conduct?

express warranties

A person can work for a U.S. employer as an H-1B employee for a maximum continuous period of ten years.

false

A trademark is business information that represents something of economic value, has required effort or cost to develop, has some degree of uniqueness or novelty, is generally unknown to the public, and is kept confidential.

false

China is considered one of the best sources of programming skills outside Europe and North America.

false

Companies are prohibited from exporting quantities of used electronics to companies in underdeveloped countries.

false

Cyberstalking differs from cyberharassment in that it is aimed at tormenting an individual but does not involve a credible threat of physical harm.

false

Formulas, inventions, and processes are not considered forms of intellectual property.

false

If a particular project requires only temporary help, and the workers will not be needed for future projects, the use of contingent workers is a poor approach.

false

In integration testing, special software programs called static analyzers are run against the new code

false

Industrial espionage and competitive intelligence are essentially the same.

false

It is fairly simple to prevent contingent workers from passing on corporate processes and strategies to subsequent employers.

false

Labor productivity is measured by the annual revenue an employee generates divided by the employee's annual salary.

false

Lifestyle changes have led to a decrease in chronic illnesses, such as diabetes and heart disease, that are expensive and difficult to treat.

false

Machine learning is a branch of engineering that involves the development and manufacture of mechanical or computer devices that can perform tasks that require a high degree of precision or that are tedious or hazardous for human beings.

false

Outsourcing is a short-term business arrangement in which a company contracts for services with an overseas organization that has expertise in providing a specific function.

false

Quotation marks, which can be used to quickly spread a company's message, allow a company's tweets to be seen not only by its followers but also by those who are interested in the topic being tweeted about.

false

Reverse engineering can only be applied to computer hardware, not computer software.

false

Social shopping Web sites earn money solely by sharing with retailers data about their members' likes and dislikes.

false

Software defects are commonly lethal and many personal injuries are related to software failures.

false

Temporary employees must be treated like official employees of the company and are eligible for vacation, sick pay, and retirement benefits.

false

The Electronic Industry Citizenship Coalition established a system that enables purchasers to evaluate, compare, and select electronic products based on a total of 51 environmental criteria.

false

The World Intellectual Property Organization (WIPO) Copyright Treaty of 1996 eliminated many of the original copyright protections for electronic media.

false

The fair use doctrine denies portions of patented materials to be used without permission under any circumstance.

false

The first release of a software product typically meets all its users' expectations.

false

The recommended approach to put an end to cyberstalking is to insist that the cyberstalker meet face-to-face with the victim to talk things out.

false

The types of work-related activities best suited for automation include activities associated with managing others, applying expertise in making decisions and offering recommendations, interacting with stakeholders, and performing physical activities in an unstructured and unpredictable environment.

false

When developing safety-critical systems, a key assumption must be that safety will automatically result from following an organization's standard development methodology.

false

When forced to choose between adding more user features and doing more testing, most software companies decide in favor of more testing.

false

currently, there is a fairly narrow range of social networking Web sites catering to interests of Internet users represented online

false

Which of the following is NOT one of the three major components of machine learning systems?

function

What classification is given to an individual who provides services to another individual or organization according to terms defined in a written contract or within a verbal agreement?

independent contractor

Which country is considered one of the best sources of programming skills outside of Europe and North America?

india

In the context of Capability Maturity Model Integration, process is ad hoc and chaotic; organization tends to overcommit and processes are often abandoned during times of crisis in which of the following maturity levels?

initial

After successful unit testing, the subsystems are combined to test the entire system as a complete entity using what form of testing?

integration testing

Patent law protects which of the following?

inventions

While using social networks as part of the hiring process, employers can:

look at the profiles of potential candidates

The primary areas where IT has been applied include all of the following except:

medical language processing

Which aspect of artificial intelligence involves technology that allows computers to understand, analyze, manipulate, and/or generate English?

natural language processing

When sued for which of the following, a software supplier is not held responsible for every product defect that causes customer or third-party loss?

negligence

Firefox and OpenOffice are all examples of which of the following?

open source software

Which of the following terms is used to describe the act of stealing someone's ideas or words and passing them off as one's own?

plagiarism

For which of the following reasons has Egypt become a less attractive country as a source of IT outsourcing?

political unrest

The two primary objectives of social media advertisers are driving traffic to a Web site to increase product sales and which of the following?

raise brand awareness

A majority of social shopping platforms generate revenue through which of the following?

retailer advertising

The process of taking something apart in order to understand it, build a copy of it, or improve it is known as which of the following?

reverse engineering

The National Center for Victims of Crime advises victims to:

send the stalker a written notice that their contact is unwanted and that further contact should cease

In which of the following is a defendant held responsible for injuring another person, regardless of negligence or intent?

strict liability

One key advantage that trade secret law has over the use of patents and copyrights in protecting companies from losing control of their intellectual property is

there is no need to file an application or disclose the trade secret to gain protection

How many classes of items did the U.S. Supreme Court rule could not be patented?

three

Violators of the False Claims Act are liable for how many times the dollar amount for which the government was defrauded?

three

A PHR can exist either as a stand-alone application that allows information to be exported to or imported from other sources or as a "tethered" application connected to a specific healthcare organization's information system.

true

A common use of open source software is to move data from one application to another and to extract, transform, and load business data into large databases.

true

A computerized provider order entry (CPOE) system enables physicians to place orders (for drugs, laboratory tests, radiology, physical therapy) electronically, with the orders transmitted directly to the recipient.

true

A key requirement for using H-1B workers is that employers must pay H-1B workers the prevailing wage for the work being performed.

true

A successful defense against a product liability case is typically expensive in terms of legal fees.

true

An advantage social network advertising has over more traditional advertising media is that it allows advertisers to create an opportunity to generate a conversation with ad viewers.

true

Based on the data from the National Center for Education Statistics there are some 130,000 new computer and information science graduates each year to fill what the BLS projects as a need of roughly 53,000 new U.S. tech job openings per year.

true

Clinical decision support (CDS) is a process and a set of tools designed to enhance healthcare-related decision making through the use of clinical knowledge and patient-specific information to improve healthcare delivery.

true

Companies can use the Statement on Standards for Attestation Engagements (SSAE) No. 16, to ensure that company data is protected in an outsourcing arrangement

true

Electronics manufacturing employees and suppliers at all steps along the supply chain and manufacturing process are at risk of unhealthy exposure to potentially harmful materials.

true

Inappropriate material posted online includes nonconsensual posts that comprise intimate photos or videos of people without their permission; such posts are often referred to as "revenge porn."

true

Natural language processing is an aspect of artificial intelligence that involves technology that allows computers to understand, analyze, manipulate, and/or generate "natural" languages, such as English.

true

Remote monitoring involves the regular, ongoing, accurate measurement of an individual's vital signs and other health measures and the transmission of this data to a healthcare provider.

true

Risk analysis is important for safety-critical systems, but is useful for other kinds of software development as well.

true

Risk is the potential of gaining or losing something of value.

true

Software suppliers attempt to limit their liability by specifying that although software is warranted to run on a given machine configuration, no assurance is given as to what that software will do.

true

Software, video games, multimedia works, and Web pages can all be copyrighted.

true

Store-and-forward telemedicine involves acquiring data, sound, images, and video from a patient and then transmitting everything to a medical specialist for later evaluation.

true

The World Trade Organization (WTO) developed the Agreement on Trade-Related Aspects of Intellectual Property Rights to establish the minimum levels of protection that each government must provide to the intellectual property of all WTO members

true

The development and use of new medical technology, such as new diagnostic procedures and treatments, also contributes to the increase in healthcare spending per person.

true

The goal of the Jacob Wetterling Crimes Against Children and Sexually Violent Offender Registration Act is to provide law enforcement and citizens with the location of all sex offenders in the community.

true

The main body of law that governs patents is contained in Title 35 of the U.S. Code.

true

There are thousands of mobile applications available to improve patient's access to healthcare information and to enable doctors to keep a close watch on patients' conditions

true

User acceptance testing is performed by trained end users to ensure that the system operates as they expect.

true

In an attempt to limit their liability in the event of nonperformance, software suppliers frequently write which of the following?

warranties


Kaugnay na mga set ng pag-aaral

Research study 10.1 Longsbary (done)

View Set

Chapters 18-20: Cardiovascular System

View Set

EAQ- mastery patient safety and quality

View Set

Orientation to Education Final Exam Review

View Set